Working Memory Attack on LLMs
☆17May 27, 2025Updated 10 months ago
Alternatives and similar repositories for working-memory-attack-on-llms
Users that are interested in working-memory-attack-on-llms are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- TaCo: Enhancing Cross-Lingual Transfer for Low-Resource Languages in LLMs through Translation-Assisted Chain-of-Thought Processes☆14Jul 1, 2025Updated 8 months ago
- ☆25Jan 17, 2025Updated last year
- Unofficial implementation of "Backdooring Instruction-Tuned Large Language Models with Virtual Prompt Injection"☆27Jul 6, 2024Updated last year
- ☆10Mar 22, 2019Updated 7 years ago
- annotated dataset of cyber-security related tweets☆22May 10, 2021Updated 4 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆26Aug 21, 2024Updated last year
- RevLLM -- Reverse Engineering Tools for Large Language Models☆20Feb 29, 2024Updated 2 years ago
- Official TensorFlow implementation of "Parsimonious Black-Box Adversarial Attacks via Efficient Combinatorial Optimization" (ICML 2019)☆42Dec 7, 2020Updated 5 years ago
- Implementation of our ICLR 2021 paper: Policy-Driven Attack: Learning to Query for Hard-label Black-box Adversarial Examples.☆11Mar 9, 2021Updated 5 years ago
- ☆13Dec 28, 2024Updated last year
- Code and data of the EMNLP 2021 paper "Mind the Style of Text! Adversarial and Backdoor Attacks Based on Text Style Transfer"☆46Oct 12, 2022Updated 3 years ago
- ☆16Nov 8, 2024Updated last year
- A project from EECS6414M of Winter 2020 at York University☆11Mar 26, 2020Updated 6 years ago
- Codebase of https://arxiv.org/abs/2410.14923☆54Oct 22, 2024Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆11Feb 21, 2022Updated 4 years ago
- ☆13Apr 13, 2025Updated 11 months ago
- ☆11Nov 5, 2018Updated 7 years ago
- ICL backdoor attack☆17Nov 4, 2024Updated last year
- deep learning, malware detection, predictive uncertainty, dataset shift, calibration, uncertainty quantification, android malware☆16Nov 30, 2021Updated 4 years ago
- Repository for the ACL'22 paper "So Different Yet So Alike! Constrained Unsupervised Text Style Transfer"☆16Jan 19, 2024Updated 2 years ago
- Easily turn large sets of image urls to an image dataset. Can download, resize and package 100M urls in 20h on one machine.☆14May 24, 2024Updated last year
- Repository for building the Sharemind SDK☆16Sep 18, 2023Updated 2 years ago
- ☆23Dec 14, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Codebase for information theoretic shapley values to explain predictive uncertainty.This repo contains the code related to the paperWatso…☆22Jul 4, 2024Updated last year
- Experimental Code for Private Decision Tree Evaluation☆16Sep 12, 2023Updated 2 years ago
- Official repository to release the code and datasets in the paper, "Article Reranking by Memory-enhanced Key Sentence Matching for Detect…☆19Dec 15, 2021Updated 4 years ago
- A suite of WiFi/Bluetooth offensive and defensive tools for the ESP32☆13Nov 16, 2023Updated 2 years ago
- [USENIX Security '24] An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities agai…☆57Mar 22, 2025Updated last year
- Official code and datas for "Bridging Gaps: Federated Multi-View Clustering in Heterogeneous Hybrid Views". (NeurIPS 2024)☆16Oct 13, 2024Updated last year
- The code implementation of GraCeFul (Accepted in COLING 2025)☆13Jan 27, 2025Updated last year
- ☆23Apr 9, 2024Updated last year
- Code for the paper "(De)Randomized Smoothing for Certifiable Defense against Patch Attacks" by Alexander Levine and Soheil Feizi.☆17Aug 22, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- 该项目实现了隐私保护和可验证的卷积神经网络(CNN)测试,旨在使模型开发者能够在多个测试者提供的非公开数据上向用户证明CNN性能的真实性,同时保护模型和数据的隐私。☆17Oct 23, 2023Updated 2 years ago
- Using CRF++ for NER☆20Feb 28, 2019Updated 7 years ago
- Can Knowledge Editing Really Correct Hallucinations? (ICLR 2025)☆27Aug 10, 2025Updated 7 months ago
- [S&P'24] Test-Time Poisoning Attacks Against Test-Time Adaptation Models☆19Feb 18, 2025Updated last year
- ☆14Sep 11, 2023Updated 2 years ago
- ☆10Dec 24, 2025Updated 3 months ago
- Cerebro: A platform for Secure Coopetitive Learning☆24Sep 9, 2021Updated 4 years ago